DEVICE FOR DETECTING VARIANT MALICIOUS CODE ON BASIS OF NEURAL NETWORK LEARNING, METHOD THEREFOR, AND COMPUTER-READABLE RECORDING MEDIUM IN WHICH PROGRAM FOR EXECUTING SAME METHOD IS RECORDED

The present invention provides an apparatus for detecting variants of malicious code based on neural network learning, a method therefor and a computer readable recording medium storing a program for performing the method. According to the present invention, one-dimensional binary data is converted...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: BYEON, Hyeong Jin, LEE, Won Kyung, CHUNG, Ui Jung
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator BYEON, Hyeong Jin
LEE, Won Kyung
CHUNG, Ui Jung
description The present invention provides an apparatus for detecting variants of malicious code based on neural network learning, a method therefor and a computer readable recording medium storing a program for performing the method. According to the present invention, one-dimensional binary data is converted into two-dimensional data without separate extraction of features, and deep learning is performed through a neural network having a nonlinear multilayered structure, such that the features of the malicious code and variants thereof may be extracted by performing the deep learning. Therefore, since no separate feature extraction tool or artificial effort by an expert is required, an analysis time is reduced, and variants of malicious code that cannot be captured by existing malicious code classification tools may be detected by performing the deep learning.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP3483767A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP3483767A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP3483767A13</originalsourceid><addsrcrecordid>eNqNjrFOAzEQRK-hQMA_7AckBTpEaDf2XLzi7D3t2QldFCFTIYgU_o9fwwToqaaZN_Muu0-PrTjQoEYeGS5L2tCWTThlijyKEy0zOfUgTbTmWWbSgRKK8dgi79QeaQRbauiCInJQTznA0FYXxMk3PE4lw5YG9rweQQan5r_PIryUSJJoF8QFmkw3xvGshCe4claaOeJvuxn84PDX3cXL4fVUb37zqqMB2YVlPb7v6-l4eK5v9WOPqb976Ff3K77t_1H5Akm7THg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>DEVICE FOR DETECTING VARIANT MALICIOUS CODE ON BASIS OF NEURAL NETWORK LEARNING, METHOD THEREFOR, AND COMPUTER-READABLE RECORDING MEDIUM IN WHICH PROGRAM FOR EXECUTING SAME METHOD IS RECORDED</title><source>esp@cenet</source><creator>BYEON, Hyeong Jin ; LEE, Won Kyung ; CHUNG, Ui Jung</creator><creatorcontrib>BYEON, Hyeong Jin ; LEE, Won Kyung ; CHUNG, Ui Jung</creatorcontrib><description>The present invention provides an apparatus for detecting variants of malicious code based on neural network learning, a method therefor and a computer readable recording medium storing a program for performing the method. According to the present invention, one-dimensional binary data is converted into two-dimensional data without separate extraction of features, and deep learning is performed through a neural network having a nonlinear multilayered structure, such that the features of the malicious code and variants thereof may be extracted by performing the deep learning. Therefore, since no separate feature extraction tool or artificial effort by an expert is required, an analysis time is reduced, and variants of malicious code that cannot be captured by existing malicious code classification tools may be detected by performing the deep learning.</description><language>eng ; fre ; ger</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190515&amp;DB=EPODOC&amp;CC=EP&amp;NR=3483767A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76516</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190515&amp;DB=EPODOC&amp;CC=EP&amp;NR=3483767A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>BYEON, Hyeong Jin</creatorcontrib><creatorcontrib>LEE, Won Kyung</creatorcontrib><creatorcontrib>CHUNG, Ui Jung</creatorcontrib><title>DEVICE FOR DETECTING VARIANT MALICIOUS CODE ON BASIS OF NEURAL NETWORK LEARNING, METHOD THEREFOR, AND COMPUTER-READABLE RECORDING MEDIUM IN WHICH PROGRAM FOR EXECUTING SAME METHOD IS RECORDED</title><description>The present invention provides an apparatus for detecting variants of malicious code based on neural network learning, a method therefor and a computer readable recording medium storing a program for performing the method. According to the present invention, one-dimensional binary data is converted into two-dimensional data without separate extraction of features, and deep learning is performed through a neural network having a nonlinear multilayered structure, such that the features of the malicious code and variants thereof may be extracted by performing the deep learning. Therefore, since no separate feature extraction tool or artificial effort by an expert is required, an analysis time is reduced, and variants of malicious code that cannot be captured by existing malicious code classification tools may be detected by performing the deep learning.</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjrFOAzEQRK-hQMA_7AckBTpEaDf2XLzi7D3t2QldFCFTIYgU_o9fwwToqaaZN_Muu0-PrTjQoEYeGS5L2tCWTThlijyKEy0zOfUgTbTmWWbSgRKK8dgi79QeaQRbauiCInJQTznA0FYXxMk3PE4lw5YG9rweQQan5r_PIryUSJJoF8QFmkw3xvGshCe4claaOeJvuxn84PDX3cXL4fVUb37zqqMB2YVlPb7v6-l4eK5v9WOPqb976Ff3K77t_1H5Akm7THg</recordid><startdate>20190515</startdate><enddate>20190515</enddate><creator>BYEON, Hyeong Jin</creator><creator>LEE, Won Kyung</creator><creator>CHUNG, Ui Jung</creator><scope>EVB</scope></search><sort><creationdate>20190515</creationdate><title>DEVICE FOR DETECTING VARIANT MALICIOUS CODE ON BASIS OF NEURAL NETWORK LEARNING, METHOD THEREFOR, AND COMPUTER-READABLE RECORDING MEDIUM IN WHICH PROGRAM FOR EXECUTING SAME METHOD IS RECORDED</title><author>BYEON, Hyeong Jin ; LEE, Won Kyung ; CHUNG, Ui Jung</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP3483767A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2019</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>BYEON, Hyeong Jin</creatorcontrib><creatorcontrib>LEE, Won Kyung</creatorcontrib><creatorcontrib>CHUNG, Ui Jung</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>BYEON, Hyeong Jin</au><au>LEE, Won Kyung</au><au>CHUNG, Ui Jung</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>DEVICE FOR DETECTING VARIANT MALICIOUS CODE ON BASIS OF NEURAL NETWORK LEARNING, METHOD THEREFOR, AND COMPUTER-READABLE RECORDING MEDIUM IN WHICH PROGRAM FOR EXECUTING SAME METHOD IS RECORDED</title><date>2019-05-15</date><risdate>2019</risdate><abstract>The present invention provides an apparatus for detecting variants of malicious code based on neural network learning, a method therefor and a computer readable recording medium storing a program for performing the method. According to the present invention, one-dimensional binary data is converted into two-dimensional data without separate extraction of features, and deep learning is performed through a neural network having a nonlinear multilayered structure, such that the features of the malicious code and variants thereof may be extracted by performing the deep learning. Therefore, since no separate feature extraction tool or artificial effort by an expert is required, an analysis time is reduced, and variants of malicious code that cannot be captured by existing malicious code classification tools may be detected by performing the deep learning.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre ; ger
recordid cdi_epo_espacenet_EP3483767A1
source esp@cenet
subjects CALCULATING
COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title DEVICE FOR DETECTING VARIANT MALICIOUS CODE ON BASIS OF NEURAL NETWORK LEARNING, METHOD THEREFOR, AND COMPUTER-READABLE RECORDING MEDIUM IN WHICH PROGRAM FOR EXECUTING SAME METHOD IS RECORDED
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-15T09%3A12%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=BYEON,%20Hyeong%20Jin&rft.date=2019-05-15&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP3483767A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true